Back
 JIS  Vol.8 No.1 , January 2017
Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment
Abstract: The data and applications in cloud computing reside in cyberspace, that allowing to users access data through any connection device, when you need to transfer information over the cloud, you will lose control of it. There are multi types of security challenge must be understood and countermeasures. One of the major security challenges is resources of the cloud computing infrastructures are provided as services over the Internet, and entire data in the cloud computing are reside over network resources, that enables the data to be access through VMs. In this work, we describe security techniques for securing a VCCI, VMMs such as Encryption and Key Management (EKM), Access Control Mechanisms (ACMs), Virtual Trusted Platform Module (vTPM), Virtual Firewall (VF), and Trusted Virtual Domains (TVDs). In this paper we focus on security of virtual resources in Virtualized Cloud Computing Infrastructure (VCCI), Virtual Machine Monitor (VMM) by describing types of attacks on VCCI, and vulnerabilities of VMMs and we describe the techniques for securing a VCCI.
Cite this paper: Althobaiti, A. (2017) Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment. Journal of Information Security, 8, 1-7. doi: 10.4236/jis.2017.81001.
References

[1]   Kulkarni, G., et al. (2012) Cloud Security Challenges. 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA), India, October 2012, 88-91.

[2]   Zhang, L.J., et al. (2009) CCOA: Cloud Computing Open Architecture. IEEE International Conference on Web Services, IBM T.J. Watson Research Center, New York, 6-10 July 2009, 607-616.

[3]   Mehra, P., Katsaros, D., Vakali, A., Pallis, G. and Dikaiakos, M.D. (2009) Cloud Computing: Distributed Internet Computing for IT and Scientific Research. IEEE Internet Computing, 13, 10-13.

[4]   Shengmei, L., et al. (2011) Virtualization Security for Cloud Computing Service. International Conference on Cloud and Service Computing, China, 174-179.

[5]   Fu, W. and Li, X. (2011) The Study on Data Security in Cloud Computing Based on Virtualization. International Symposium on IT in Medicine and Education (ITME), Chongqing College of Electronic Engineering, 9-11 December 2011, 257-261.

[6]   Buyya, R., Garg, S.K. and Calheiros, R.N. (2011) SLA-Oriented Resource Provisioning for Cloud Computing: Challenges, Architecture, and Solutions. International Conference on Cloud and Service Computing, IEEE Computer Society, Washington DC, 1-10.

[7]   Liang, C., Zhang, Y. and Han, Z.H. (2013) Quantitatively Measure Access Control Mechanisms across Different Operating Systems. 7th International Conference on Software Security and Reliability, Beijing, 18-20 June 2013, 50-59. https://doi.org/10.1109/sere.2013.12

[8]   Berger, S., et al. (2006) vTPM: Virtualizing the Trusted Platform Module. Security’06: 15th USENIX Security Symposium, Vancouver, BC, 31 July-4 August 2006, 305-320.

[9]   Brohi, S.N., Bamiah, M., Brohi, M.N. and Kamran, R. (2012) Identifying and Analyzing Security Threats to Virtualized Cloud Computing Infrastructures. Proceedings of International of Cloud Computing, Technologies, Applications & Management, 151-155.

[10]   Griffin, J.L., Jaeger, T., Perez, R., Sailer, R., van Doorn, L. and Cáceres, R. (2005) Trusted Virtual Domains: Toward Secure Distributed Services. The 1st Workshop on Hot Topics in System Dependability, Yokohama, 30 June 2005, 1-6.

[11]   Iqbal, A., Pattinson, C. and Kor, A.-L. (2015) Performance Monitoring of Virtual Machines (VMs) of Type I and II hypervisors with SNMPv3. World Congress on Sustainable Technologies (WCST), Leeds, 14-16 December 2015, 98-99.

 
 
Top